A GPU-based rowhammer attack achieved root access on a Linux system
Professor of Cybersecurity at University of Oulu and National Defence University of Finland.
A father of three and a husband of one. Fan of all things chocolate.
Professor of Cybersecurity at University of Oulu and National Defence University of Finland.
A father of three and a husband of one. Fan of all things chocolate.
A GPU-based rowhammer attack achieved root access on a Linux system
CircleCI's analysis of 28 million CI workflows confirms the same picture the DORA data shows. While feature branch activity's up significantly, the median impact on *main* (i.e. release) branch activity's net-negative 7%.
Only the top 5% of teams saw significant gains. The top 10% flatlined at 1%.
For the average team, AI slows them down overall.
Told ya!

In our last issue, we shared a preview of data from our upcoming 2026 State of Software Delivery showing that the promised AI productivity boom isn’t all hype. Throughput across the CircleCI platform increased 59% year-over-year, by far the largest productivity jump we've ever recorded and a clear i
ICYMI April 10 will be the inaugural edition of Convoy, a new course in #selfhosted and private email infrastructure.
Intended for complete newcomers, participants are fully supported in the build up of a high-reputation, sovereign and tightly-secured mail server, complete with webmail frontend.
Dozens of free accounts can be given to family, friends & colleagues to help them off predatorial, profit-driven & shady email providers (from Google to Proton).
RE: https://neuromatch.social/@jonny/116324676116121930
Incredible thread.
Answered some of my questions about what people think the future will be if everyone codes like this. It seems to be: instead of thinking about constraints of any kind or "what is the most efficient way to do Y or the most readable way to do Z?" answer the question, "what is the most brute force way to perform X if I pretend that there are no resource constraints and nothing needs to make sense as long as I see some sort of test passing? Just ship it with spaghetti code.
Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell (CVE-2026-4747)
https://github.com/califio/publications/blob/main/MADBugs/CVE-2026-4747/write-up.md
#HackerNews #FreeBSD #RCE #Security #CVE-2026-4747 #RootShell #CyberSecurity
NEW: WhatsApp alerted around 200 users who were tricked into installing a fake app that was actually government spyware.
The company accused Italian spyware maker SIO of being behind the app, and announced it plans to send the company "a formal legal demand to stop any such malicious activity."
New: Mercor, a popular AI recruiting startup, has confirmed a security incident linked to a supply chain attack involving the open-source project LiteLLM.
Are we having fun yet?

Quantum computers have the potential to perform computational tasks beyond the reach of classical machines. A prominent example is Shor's algorithm for integer factorization and discrete logarithms, which is of both fundamental importance and practical relevance to cryptography. However, due to the high overhead of quantum error correction, optimized resource estimates for cryptographically relevant instances of Shor's algorithm require millions of physical qubits. Here, by leveraging advances in high-rate quantum error-correcting codes, efficient logical instruction sets, and circuit design, we show that Shor's algorithm can be executed at cryptographically relevant scales with as few as 10,000 reconfigurable atomic qubits. Increasing the number of physical qubits improves time efficiency by enabling greater parallelism; under plausible assumptions, the runtime for discrete logarithms on the P-256 elliptic curve could be just a few days for a system with 26,000 physical qubits, while the runtime for factoring RSA-2048 integers is one to two orders of magnitude longer. Recent neutral-atom experiments have demonstrated universal fault-tolerant operations below the error-correction threshold, computation on arrays of hundreds of qubits, and trapping arrays with more than 6,000 highly coherent qubits. Although substantial engineering challenges remain, our theoretical analysis indicates that an appropriately designed neutral-atom architecture could support quantum computation at cryptographically relevant scales. More broadly, these results highlight the capability of neutral atoms for fault-tolerant quantum computing with wide-ranging scientific and technological applications.